CYBERSECURITY AS REALPOLITIK
CELLULAR EXPLOITATION ON A GLOBAL SCALE: THE RISE AND FALL OF THE CONTROL PROTOCOL
DIGGING FOR IE11 SANDBOX ESCAPES
EVASION OF HIGH-END IPS DEVICES IN THE AGE OF IPV6
PIVOTING IN AMAZON CLOUDS
PREVALENT CHARACTERISTICS IN MODERN MALWARE
REVERSE ENGINEERING FLASH MEMORY FOR FUN AND BENEFIT
SECSI PRODUCT DEVELOPMENT: TECHNIQUES FOR ENSURING SECURE SILICON APPLIED TO OPEN-SOURCE VERILOG PROJECTS
THE BEAST WINS AGAIN: WHY TLS KEEPS FAILING TO PROTECT HTTP
THE LIBRARY OF SPARTA
API SECURITY ROUNDTABLE: LESSONS LEARNED IN API SECURITY
ATTACKING MOBILE BROADBAND MODEMS LIKE A CRIMINAL WOULD
A SURVEY OF REMOTE AUTOMOTIVE ATTACK SURFACES
HOW TO WEAR YOUR PASSWORD
BRINGING SOFTWARE DEFINED RADIO TO THE PENETRATION TESTING COMMUNITY
CLOUDBOTS: HARVESTING CRYPTO COINS LIKE A BOTNET FARMER
FULL SYSTEM EMULATION: ACHIEVING SUCCESSFUL AUTOMATED DYNAMIC ANALYSIS OF EVASIVE MALWARE
WINDOWS KERNEL GRAPHICS DRIVER ATTACK SURFACE
MY GOOGLE GLASS SEES YOUR PASSWORDS!
NETWORK ATTACHED SHELL: N.A.S.TY SYSTEMS THAT STORE NETWORK ACCESSIBLE SHELLS
GOVERNMENT POLICY ROUNDTABLE: UNDERSTANDING THE NIST RISK MANAGEMENT FRAMEWORK
DEFEATING THE TRANSPARENCY FEATURE OF DBI
ANDROID FAKEID VULNERABILITY WALKTHROUGH
ORACLE DATA REDACTION IS BROKEN
POINT OF SALE SYSTEM ARCHITECTURE AND SECURITY
DATA-ONLY PWNING MICROSOFT WINDOWS KERNEL: EXPLOITATION OF KERNEL POOL OVERFLOWS ON MICROSOFT WINDOWS 8.1
MOBILE DEVICE MISMANAGEMENT
THE BEAST IS IN YOUR MEMORY: RETURN-ORIENTED PROGRAMMING ATTACKS AGAINST MODERN CONTROL-FLOW INTEGRITY PROTECTION TECHNIQUES
UNVEILING THE OPEN SOURCE VISUALIZATION ENGINE FOR BUSY HACKERS
OPENSTACK CLOUD AT YAHOO SCALE: HOW TO AVOID DISASTER
GOVERNMENTS AS MALWARE AUTHORS: THE NEXT GENERATION
VOIP WARS: ATTACK OF THE CISCO PHONES
EMBEDDED DEVICES ROUNDTABLE: EMBEDDING THE MODERN WORLD, WHERE DO WE GO FROM HERE?
APT ATTRIBUTION AND DNS PROFILING
PROTECTING DATA IN-USE FROM FIRMWARE AND PHYSICAL ATTACKS
PULLING BACK THE CURTAIN ON AIRPORT SECURITY: CAN A WEAPON GET PAST TSA?
SECURE BECAUSE MATH: A DEEP-DIVE ON MACHINE LEARNING-BASED MONITORING
WHY CONTROL SYSTEM CYBER-SECURITY SUCKS...
MULTIPATH TCP: BREAKING TODAY'S NETWORKS WITH TOMORROW'S PROTOCOLS
THE BIG CHILL: LEGAL LANDMINES THAT STIFLE SECURITY RESEARCH AND HOW TO DISARM THEM
DYNAMIC FLASH INSTRUMENTATION FOR FUN AND PROFITĖ
FINDING AND EXPLOITING ACCESS CONTROL VULNERABILITIES IN GRAPHICAL USER INTERFACES
REFLECTIONS ON TRUSTING TRUSTZONE
WHAT GOES AROUND COMES BACK AROUND - EXPLOITING FUNDAMENTAL WEAKNESSES IN BOTNET C&C PANELS!
CERTIFICATIONS ROUNDTABLE: THE QUEST FOR VALUE
A SCALABLE, ENSEMBLE APPROACH FOR BUILDING AND VISUALIZING DEEP CODE-SHARING NETWORKS OVER MILLIONS OF MALICIOUS BINARIES
BREAKING THE SECURITY OF PHYSICAL DEVICES
CONTEMPORARY AUTOMATIC PROGRAM ANALYSIS
RESEARCHING ANDROID DEVICE SECURITY WITH THE HELP OF A DROID ARMY
ABUSING PERFORMANCE OPTIMIZATION WEAKNESSES TO BYPASS ASLR
802.1X AND BEYOND!
COMPUTRACE BACKDOOR REVISITED
LEARN HOW TO CONTROL EVERY ROOM AT A LUXURY HOTEL REMOTELY: THE DANGERS OF INSECURE HOME AUTOMATION DEPLOYMENT
BABAR-IANS AT THE GATE: DATA PROTECTION AT MASSIVE SCALE
RESPONSIBLE DISCLOSURE ROUNDTABLE: YOU MAD BRO?
HOW TO LEAK A 100-MILLION-NODE SOCIAL GRAPH IN JUST ONE WEEK? - A REFLECTION ON OAUTH AND API DESIGN IN ONLINE SOCIAL NETWORKS